Each tool page covers its purpose, the specific fields or outputs to check, and red flags that indicate something suspicious.
01
WinLiveInfo
system info
02
Meow Doomsday Fucker
memory scanner
03
TasksParser
scheduled tasks
04
RedLotus Mod Analyzer
mod scanner
05
RedLotus Alt Checker
account scanner
06
BAM Parser
execution history
07
BAM Reveal
execution history
08
Espouken
multi-purpose
09
Fileless
memory / powershell
10
InjGen
injection detector
11
Everything
file search
12
JournalTrace
file activity
14
PrefetchParser
execution history
15
PrefetchView++
execution history
16
System Informer
process analysis
WinLiveInfo
System hardware and software snapshot
download
Meow Doomsday Fucker
Doomsday cheat memory scanner
download
JAR Parser
Minecraft JAR file analyzer
download
Tasks Parser
Windows scheduled tasks analyzer
download
RedLotus Mod Analyzer
Minecraft mod verification tool
download
RedLotus Alt Checker
Account scanner across platforms
download
BAM Parser
Windows execution history reader
download
BAM Reveal
Extended BAM with cheat detection
download
Espouken
Multi-purpose SS utility
download
Fileless
In-memory PowerShell scanner
download
InjGen
DLL injection detector
download
Everything
Instant file search utility
download
JournalTrace
Windows Change Journal reader
download
PrefetchParser
Windows Prefetch execution history
download
PrefetchView++
GUI for Windows Prefetch data
download
System Informer
Process and system monitor
download
Paths Parser
File path analysis tool
download
system info tool
[ok]HyperVisorPresent must be False, confirms no VM is running
[ok]HyperVRequirementVirtualizationFirmwareEnabled must be False
[ok]OS install date, note if Windows was installed suspiciously recently
[ok]Network adapters, check CsNetworkAdapters for VPN or virtual adapters
[ok]Last boot time via OsLastBootUpTime, fresh reboots right before a check are suspicious
[ok]Motherboard and BIOS serials to verify machine consistency across checks
[!]HyperVisorPresent: True, person is likely running a VM to hide cheats
[!]VPN or virtual adapter present, e.g. x-ovpn-tap in the adapter list
[!]Windows installed the same day as the screenshare
[!]Machine rebooted within minutes before the check started
memory scanner
[ok]Run the Memory Scanner tab while Minecraft is open, it will list all detected Java processes
[ok]Output should say All processes clean. if nothing is found
[ok]Each process will show as javaw [PID] -> clean or -> DETECTED
[!]Any process showing DETECTED in the output means Doomsday was found in memory
[!]Output says Doomsday Detected in red next to the Stop button
[!]Output line reads Doomsday sucks., this is the tool confirming a positive detection
scheduled tasks
[ok]Signed column, most legitimate tasks will show Signed in green
[ok]On Logon column shows tasks that auto-run at login, pay extra attention to these
[!]Any task showing Not signed in orange, especially ones set to run On Logon
[!]Tasks running from unusual paths like AppData, Temp, or a custom folder
[!]Registry Mismatch flagged, the task on disk does not match what is registered
mod scanner
[ok]Use Memory Scan to automatically detect the running Minecraft process and its mod folder
[ok]Each mod should show Verified in green under the Modrinth column
[ok]Status column should say Found, the mod file exists where it should
[ok]Check the mod folder path shown under Generic Information, verify it matches what the player says they use
[!]Any mod showing Unverified, not found on Modrinth, could be a private or cheat mod
[!]Mod status showing Not Found, the mod was in memory but not on disk, suspicious
[!]Mod path pointing to an unexpected location outside the normal profile folder
[!]Mod folder modified after Minecraft launch, shown in red next to the path
account scanner
[ok]Use Target Scan with the player's username to search across all platforms at once
[ok]Minecraft Scan will show all Java and Bedrock accounts cached on the machine
[ok]Review the Accounts Found tab, cross-reference every account shown with the player's known alts
[ok]Check the Forensics tab for deeper evidence of account activity
[!]Accounts found that the player has not disclosed or claims not to own
[!]Multiple Minecraft accounts on the same machine, could indicate ban evasion alts
[!]Discord or Steam accounts with different usernames that do not match the player's known identity
execution history
[ok]Review the Last Execution timestamps, focus on anything run around the time of the SS or recently before it
[ok]Signature column, most legitimate programs will show Signed
[ok]Use the Not Signed Only and Flagged Only filters to narrow down suspicious entries quickly
[!]Unsigned executables run from AppData, Temp, Desktop, or non-standard paths
[!]Entries marked Deleted in the Signature column, the file was run then removed.
[!]Known cheat-related filenames in the path (e.g. injector, loader, client names)
execution history
[ok]Signature column, look for Signed, Unsigned, Fake Signature, or Cheat labels
[ok]Use Post-Logon, Show Untrusted, and Show Not Found filters to shorten results
[ok]Check Registry BAM and Deleted BAM tabs for historical and removed entries
[!]Any entry labelled Cheat in the Signature column, direct detection
[!]Entries with Fake Signature, the executable was signed with an invalid or spoofed cert
[!]Unsigned executables run from Downloads, Desktop, or temp locations shortly before the SS
multi-purpose
[ok]Show services start times, compare service start times against the system boot time to detect anything that started unexpectedly late
[ok]Scan for time changes, detects if the system clock was manipulated
[ok]Scan for unicode strings, can surface obfuscated or hidden text in memory
[ok]Show HWID, use to verify hardware ID consistency across multiple checks
[!]Services that started significantly later than boot time with no clear reason
[!]DPS service stopped or disabled, this logs diagnostic activity and is commonly disabled by cheaters
[!]Evidence of clock manipulation from the time change scan
memory / powershell
[ok]The tool outputs any suspicious PowerShell commands it finds in memory after the logon time
[ok]Review each flagged command, check what URL or script it was trying to run
[ok]Logon time is shown at the top, only events after this are relevant
[!]PowerShell commands using -ExecutionPolicy Bypass and iex (irm 'url') to download and run scripts from the internet
[!]Commands referencing known cheat or screenshare-bypass GitHub repos
[!]Multiple suspicious commands found, indicates the player ran several in-memory scripts
injection detector
[ok]Tool automatically finds the javaw.exe PID and scans it
[ok]Suspicious Modules section lists any DLLs loaded into the process that are not standard
[ok]Client strings section shows any known cheat client identifiers found in memory
[!]Output says Injection detected in untested game client, a DLL was injected into the process
[!]Known cheat client strings found, e.g. Doomsday-specific identifiers in the client strings section
[!]Unexpected DLLs with JNI flags loaded from non-standard paths inside the Minecraft process
file search
[ok]Search for common cheat-related extensions: .dll, .jar, .bat
[ok]Use date filters to shorten results to files created or modified around the SS time
[ok]Search known cheat client names, injector keywords, or loader filenames directly
[ok]Check recently created folders in unusual locations like C:\Users\Public or root of C:
[!]Cheat-related filenames anywhere on the system, even if the file no longer exists on disk
[!]DLL files sitting in AppData\Roaming, AppData\Local\Temp, or the Minecraft directory with no recognisable name
[!]Recently created .bat files often used as cleanup or launch scripts by cheat loaders
file activity
[ok]Filter events to around the time of the SS, look for create and delete pairs that happened close together
[ok]Look for file rename events, a common cleanup technique to hide what was previously run
[ok]Cross-reference deleted filenames with known cheat file names or paths flagged by other tools
[ok]Check for bulk deletions in AppData or Temp shortly before the session started
[!]A file was created and deleted within minutes
[!]Rename chains where a file had multiple name changes in a short period, suggests active obfuscation
[!]Mass deletion events in AppData or Temp immediately before Minecraft launched
[!]Known cheat filenames appearing in the journal even if the file is no longer present on disk
execution history
[ok]Check last run timestamps against the SS time, focus on anything executed within the same session window
[ok]Run count column, a count of 1 with a timestamp right before the SS suggests a one-time tool run then removed
[ok]Cross-reference executable names against known cheat tool and injector filenames
[ok]Check referenced files inside each prefetch entry, can reveal what DLLs or configs the executable loaded
[!]Prefetch entry for a known cheat tool or injector name, even if the file itself has since been deleted
[!]Single-run executables with generic or randomised names run immediately before Minecraft launched
[!]Referenced DLL paths inside a prefetch entry pointing to AppData, Temp, or non-standard locations
[!]Prefetch disabled entirely, hackers sometimes disable it to prevent this tool from being used
execution history
[ok]Sort by Last Run time and work backwards from the SS timestamp to identify what ran in the lead-up
[ok]Use the Run Count column to spot single execution programs
[ok]Click any entry to view the full list of files and DLLs it referenced during that run
[!]Executable names with randomised strings, e.g. xG7f2k.exe, run once and never again
[!]Referenced file paths inside an entry that include known cheat directory names or temp paths
process analysis
[ok]Find javaw.exe in the process list, expand it and open the Modules tab to see every DLL loaded into Minecraft
[ok]Check the Handles tab for open file handles pointing to unusual paths, can reveal what files a process is actively reading
[ok]Network tab shows all active connections per process, verify Minecraft is only connecting to expected Mojang or server IPs
[ok]Check the Memory tab for regions marked as executable but with no associated module, a sign of injected shellcode
[ok]Signature column in the process list flags unsigned or tampered executables at a glance
[ok]Use the Strings search on javaw.exe memory, filter by the player's active mods folder path to surface any mod paths still referenced in memory after being deleted or moved off disk
[!]DLLs loaded into javaw.exe that are unsigned or originate from outside the JRE or Minecraft directories
[!]Executable memory regions inside the Minecraft process with no mapped module, indicates manual code injection
[!]Unexpected outbound connections from javaw.exe to IPs or domains unrelated to the game server or Mojang
[!]Any process running with a parent that makes no logical sense, e.g. a loader spawned by explorer.exe right before Minecraft started
made by jorbay